Continuing with our series on bias, in this blog, we explore editorial bias and the challenges it presents in accurately categorizing forms of web content.
zvelo is the provider of the most advanced URL Database for Web Categorization and Malicious Detection—designed for OEMs, device manufacturer’s, and Network Security vendors. zvelo’s content categorization engines power web filtering and parental controls, whitelists and blacklists for anti-virus companies, home network protection devices, and much more. By categorizing content into topic-based, objectionable, and malicious category groupings—zveloDB provides the most advanced malicious detection for advanced threat intelligence and cybersecurity.
2018 was a wild year for cybersecurity, ad tech, and the internet in general. In this blog, we explore the significant trends and security challenges that are likely to impact us in 2019 and beyond.
Alex Wood from the Colorado = Security Podcast sat down with zvelo President & CEO, Jeff Finn, to discuss zvelo’s background and position in the Information Security space.Details
Category mappings provide flexibility and customization of URL categorization data—delivering advanced control for web filtering, parental controls, brand safety, ad fraud prevention, as well as other applications digital advertising, and more…
Learn about zvelo’s unique hybrid approach to web content categorization and malicious detection. With over 20 years of experience and partnerships with some of the world’s leading anti-virus, MSSPs, and communications companies—zvelo’s next-generation approach achieves industry-leading coverage and accuracy for end users worldwide.
An internationalized domain name (IDN) homograph attack is a method of deceiving computer users about the remote computer they’re communicating with. It exploits the fact that many characters are homographs, meaning they look alike. Homographs allow a malicious party to create an IDN that appears very similar to an established domain, which can then be used to lure users to the new website.
The purpose of this article is to provide a quick and easy visual reference the web filtering market segments and to identify where various services are positioned in the market and on the value curve.
In a previous blog, we explored the important differences between base domains and full path URLs. In this post, we wanted to take a step back and cover the basics—the individual structural elements of a URL (Uniform Resource Locator).
As more and more companies are pursuing “Data as a service” or “DaaS” business models, we wanted to share our experiences on the DaaS business model, with a specific focus on the challenges of Intellectual Property Rights (IPR) protections for DaaS data.
Over the past several years, there’s been a significant increase in mobile phishing attacks—particularly targeting enterprises. In this blog, we cover 9 tips and strategies to improve your security against mobile phishing attacks.